Skip to content

Commit d85e4e8

Browse files
committed
fixes
1 parent 3e17a59 commit d85e4e8

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

deploy-manage/security/_snippets/find-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ If you have many deployments, you can instead go to the **Hosted deployments** (
1010
4. In the deployment overview, under **Applications**, find the application that you want to test.
1111
5. Click **Copy endpoint**. The value looks something like the following:
1212

13-
```subs=true
13+
```text subs=true
1414
https://my-deployment-d53192.es.{{example-default-dn}}
1515
```
1616

deploy-manage/security/azure-private-link-traffic-filters.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The process of setting up the private connection with Azure Private link is spli
7070
| 1. [Create a private endpoint using {{ecloud}} service alias.](#ec-private-link-azure-dns) | |
7171
| 2. [Create a DNS record pointing to the private endpoint](#ec-private-link-azure-dns). | |
7272
| | 3. [Create a private connection policy.](#ec-azure-allow-traffic-from-link-id) |
73-
| | 4. [Associate the Azure Private Link rule set with your deployments](#ec-azure-associate-traffic-filter-private-link-rule-set). |
73+
| | 4. [Associate the Azure Private Link rule set with your deployments](#ec-associate-traffic-filter-private-link-rule-set). |
7474
| | 5. [Interact with your deployments over Private Link.](#ec-azure-access-the-deployment-over-private-link) |
7575

7676

@@ -83,7 +83,7 @@ The process of setting up the private connection with Azure Private link is spli
8383
Use [the service aliases for your region](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-private-link-azure-service-aliases). Select the **Connect to an Azure resource by resource ID or alias** option. For example for the region `eastus2` the service alias is `eastus2-prod-002-privatelink-service.64359fdd-7893-4215-9929-ece3287e1371.eastus2.azure.privatelinkservice`
8484

8585
::::{note}
86-
The Private Link endpoint is created in the `Awaiting Approval` state. We validate and approve the endpoints when you create the private connection policy using the Private Link `resource name` and `resource ID`, as described in the next section [Create a private connection policy](#ec-azure-allow-traffic-from-link-id).
86+
The Private Link endpoint is created in the `Awaiting Approval` state. We validate and approve the endpoints when you create the private connection policy using the Private Link `resource ID`, as described in the next section [Create a private connection policy](#ec-azure-allow-traffic-from-link-id).
8787
::::
8888

8989
2. Create a DNS record.
@@ -111,7 +111,7 @@ Follow these high-level steps to add a private connection policy that can be ass
111111
1. [Find your private endpoint resource ID](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-find-your-resource-id).
112112
2. [Create policies using the Private Link Endpoint resource ID](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-azure-create-traffic-filter-private-link-rule-set).
113113
3. [Test the connection](#test-the-connection).
114-
4. [Associate the private endpoint with your deployment](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-azure-associate-traffic-filter-private-link-rule-set).
114+
4. [Associate the private endpoint with your deployment](/deploy-manage/security/azure-private-link-traffic-filters.md#ec-associate-traffic-filter-private-link-rule-set).
115115

116116
### Find your private endpoint resource ID [ec-find-your-resource-id]
117117

deploy-manage/security/ece-filter-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Rule sets work as follows:
2323

2424
- Traffic filter rule sets, when associated with a deployment, will apply to all deployment endpoints, such as {{es}}, {{kib}}, APM Server, and others.
2525

26-
- Any traffic filter rule set assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint; deny all access over Private Link*. The implication is that if you make a mistake putting in the traffic source (for example, specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the rule sets.
26+
- Any traffic filter rule set assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint*. The implication is that if you make a mistake putting in the traffic source (for example, specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the rule sets.
2727

2828
- You can mark a rule set as *default*. It is automatically attached to all new deployments that you create in its region. You can detach default rule sets from deployments after they are created. Note that a *default* rule set is not automatically attached to existing deployments.
2929

deploy-manage/security/gcp-private-service-connect-traffic-filters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ Create a new private connection policy.
208208
15. Click **Create**.
209209
16. (Optional) You can [claim your Private Service Connect endpoint connection ID](/deploy-manage/security/claim-traffic-filter-link-id-ownership-through-api.md), so that no other organization is able to use it in a private connection policy.
210210
211-
The next step is to [associate the policy](#ec-associate-traffic-filter-private-link-rule-set) with your deployment.
211+
The next step is to [associate the policy](#ec-psc-associate-traffic-filter-psc-rule-set) with your deployment.
212212
213213
### Optional: Associate a policy with a deployment [ec-psc-associate-traffic-filter-psc-rule-set]
214214

deploy-manage/security/network-security-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Policies operate on the proxy. Requests rejected by the policies are not forward
2020

2121
- You can assign multiple policies to a single deployment. The policies can be of different types. In case of multiple policies, traffic can match any associated policy to be forwarded to the resource. If none of the policies match, the request is rejected with `403 Forbidden`.
2222
- Policies, when associated with a deployment or project, will apply to all endpoints, such as {{es}}, {{kib}}, APM Server, and others.
23-
- Any policy assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint; deny all access over Private Link*. The implication is that if you make a mistake putting in the traffic source (for example, if you specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the policies.
23+
- Any policy assigned to a deployment overrides the default behavior of *allow all access over the public internet endpoint*. The implication is that if you make a mistake putting in the traffic source (for example, if you specified the wrong IP address) the deployment will be effectively locked down to any of your traffic. You can use the UI to adjust or remove the policies.
2424
- You can [mark a policy as default](#default-network-security-policies). Default policies are automatically attached to all new resources of the matching resource type that you create in its region.
2525

2626
## Restrictions

0 commit comments

Comments
 (0)